Networking & Cloud Computing
epub |eng | | Author:Jin U. Kang
17. Wilson T (1990) Confocal microscopy academic. San Diego, Calif 18. Bae JH, Kim KH, Hong MH, Gim CH, Jhe W (2000) High-resolution confocal detection of nanometric displacement by use ...
( Category:
Networking & Cloud Computing
April 14,2020 )
epub |eng | | Author:Ivan Zelinka, Pandian Vasant & Nader Barsoum
Appendix The typical values of parameters of the system are shown below: GA Parameters:No of variables = 3; No of generation = 50; Population size = 20; Cross over probability ...
( Category:
Networking & Cloud Computing
April 14,2020 )
epub |eng | 2020-04-03 | Author:Matt Fuller
MAP MAP(ARRAY[a, b, c], ARRAY[1, 2, 3]) JSON {"a”:1,"b”:2,"c”:3} ROW ROW(1, 2, 3) Temporal Data Types Table 8-8 describes temporal data types, or data types related to dates and time. ...
( Category:
Cloud Computing
April 13,2020 )
mobi, epub |eng | 2017-10-26 | Author:Albert Anthony
Data Security in AWS Data security in the AWS platform can be classified into two broad categories: Protecting data at rest Protecting data in transit Furthermore, data security has the ...
( Category:
Disaster & Recovery
April 13,2020 )
epub |eng | | Author:Unknown
9.3 Conclusions Among the few studies on the Tower of Shadows, a small book by Francesco Venezia published in 1978 represents a significant reference for this short chapter. The approach ...
( Category:
Architecture
April 13,2020 )
epub |eng | 2020-05-25 | Author:Casey Rosenthal
1 Lisanne Bainbridge, “Ironies of Automation,” Automatica, Vol. 19, No. 6 (1983). 2 Sidney Dekker, Foundations of Safety Science: A Century of Understanding Accidents and Disasters (Boca Raton: Taylor & ...
( Category:
Testing
April 13,2020 )
epub |eng | 2020-02-17 | Author:John Tysoe and Alan Knott-Craig
India In several countries around the world, the first telephones were introduced by the British, in part to facilitate colonial administration. The British established the first phone network in India, ...
( Category:
Networking & Cloud Computing
April 13,2020 )
epub |eng | 2018-10-22 | Author:Jeffrey Hunker
( Category:
True Crime
April 13,2020 )
mobi, epub |eng | 2020-09-03 | Author:Sagar Rahalkar
( Category:
Networking & Cloud Computing
April 12,2020 )
epub |eng | 2020-04-09 | Author:Geraldine A. Van der Auwera
How is the conditional logic set up? In the match-up diagram in Table 9-1, we saw the box showing the call to CramToBamTask under the control of the presumed conditional ...
( Category:
Data Mining
April 12,2020 )
epub |eng | | Author:John C. Edmunds
Golem Golem (GNT) is one of a number of tokens that allow users to buy access to underutilized computers around the world. Golem tokens are used to buy time on ...
( Category:
Money & Monetary Policy
April 12,2020 )
epub, pdf |eng | 2006-04-10 | Author:Stan Gibilisco
CHAPTER 10 Geometry in Space Solid geometry involves points, lines, and planes. The difference between two-dimensional (2D) geometry and three-dimensional (3D) geometry is the fact that, well, there’s an extra ...
( Category:
Study & Teaching
April 11,2020 )
epub |eng | | Author:Jozefien Van Caeneghem
5.3.2 Importance of Open-Ended Categories, Multiple Affiliations and Re-classifications The design of the questionnaire can also influence the quality and reliability of data collected on Roma ethnicity.279 If data collection ...
( Category:
Networking & Cloud Computing
April 7,2020 )
epub |eng | 2020-03-20 | Author:HOFFMAN, HUGO & HOFFMAN, HUGO [HOFFMAN, HUGO]
Chapter 21 Wireless LAN Controllers Your access points will connect to a Wireless LAN Controller if they're operating in a lightweight mode. Lightweight means is that the central processing is ...
( Category:
Electronic Data Interchange (EDI)
April 7,2020 )
epub |eng | 2020-03-20 | Author:Mining, Ethem [Mining, Ethem]
Kali Linux Hacking A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts. By: Ethem Mining Introduction Have ...
( Category:
Networks
April 7,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6854)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3543)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
